System and method for preventing use of a wireless device
First Claim
1. A processor-based device that prevents unauthorized use, comprising:
- a processor for executing software instructions;
software instructions defining at least one user application;
a wireless communication subsystem that is operable to transmit and receive data utilizing a wireless protocol; and
software instructions defining a security protocol process that is operable to prevent execution of said software instructions defining said at least one user application by said processor when a message is received via said wireless communication subsystem, wherein said message indicates that said processor-based device is not in possession of a rightful user.
7 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, the present invention is directed to a processor-based device that prevents unauthorized use, comprising a processor for executing software instructions, software instructions defining at least one user application, a wireless communication subsystem that is operable to transmit and receive data utilizing a wireless protocol, and software instructions defining a security protocol process that is operable to prevent execution of the software instructions defining the at least one user application by the processor when a message is received via the wireless communication subsystem, wherein the message indicates that the processor-based device is not in possession of a rightful user.
-
Citations
20 Claims
-
1. A processor-based device that prevents unauthorized use, comprising:
-
a processor for executing software instructions;
software instructions defining at least one user application;
a wireless communication subsystem that is operable to transmit and receive data utilizing a wireless protocol; and
software instructions defining a security protocol process that is operable to prevent execution of said software instructions defining said at least one user application by said processor when a message is received via said wireless communication subsystem, wherein said message indicates that said processor-based device is not in possession of a rightful user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for protecting a processor-based device from unauthorized use, wherein said processor-based device performs wireless communication, said method comprising:
-
receiving notice that said processor-based device is not in possession of a right user;
sending a message to said processor-based device to initiate a security protocol via a wireless communication protocol;
receiving said message by said processor-based device; and
initiating said security protocol on said processor-based device in response to said received message, wherein said initiating comprises preventing execution by said processor-based device of at least one user application that is defined by software instructions stored on said processor-based device in response to receiving said message by said processor-based device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system that prevents unauthorized use, comprising:
-
means for processing software instructions;
means for defining at least one user application;
means for transmitting and receiving data utilizing a wireless communication protocol; and
means for preventing execution of said software instructions defining said at least one user application by said means for processing when a message is received via said means for transmitting and receiving, wherein said message indicates that said system is not in possession of a rightful user. - View Dependent Claims (17, 18, 19, 20)
-
Specification